PodcastsNewsCISO Insights: Voices in Cybersecurity

CISO Insights: Voices in Cybersecurity

CISO Marketplace
CISO Insights: Voices in Cybersecurity
Latest episode

409 episodes

  • CISO Insights: Voices in Cybersecurity

    Kill Chains and Code: Russia’s Pragmatic Shift to Tactical AI

    19/2/2026 | 15 mins.
    This episode explores how the Russian military has pivoted from failed, centralized command architectures to a fragmented but effective ecosystem of volunteer-built tactical software like the "Glaz/Groza" complex. We discuss the critical role of civilian engineers in adapting commercial technology and open-weight AI models to accelerate drone-to-artillery kill chains. Finally, we examine the security risks of using open-source tech and how Russia is mitigating them through domestic platforms like Astra Linux and systematic data collection.

    www.securitycareers.help/russian-command-and-control-transitioning-toward-ai-enabled-warfare

     

    Sponsors:

    www.cisomarketplace.com

    www.myprivacy.blog
  • CISO Insights: Voices in Cybersecurity

    The Right Fit: A C3PAO Shopping Guide for SMBs

    18/2/2026 | 14 mins.
    This episode breaks down the ND-ISAC’s essential guide designed to help small and medium-sized businesses avoid the "race to the bottom" when selecting a Third-Party Assessment Organization (C3PAO). We discuss how to utilize a comprehensive scoring system to evaluate potential assessors on critical criteria like technical aptitude, reasonableness, and the all-important intake process. Listeners will learn why the lowest price often carries the highest risk and how to identify an assessor who truly understands their unique environment.

    www.securitycareers.help/c3pao-selection-guide-for-small-and-medium-sized-businesses-strategic-briefing

     

    Sponsors:

    https://baseline.compliancehub.wiki

    https://cmmcnist.tools
  • CISO Insights: Voices in Cybersecurity

    Digital Fingerprints: Unmasking Russian Influence

    17/2/2026 | 16 mins.
    Join us as we explore the "Information Influence Attribution Framework," a methodology designed to pierce the veil of anonymous Russian disinformation campaigns in Ukraine and beyond. We break down how analysts combine technical infrastructure data, behavioral patterns like those in the DISARM framework, and contextual clues to distinguish organic viral content from coordinated state attacks. Through real-world case studies—from fake BBC videos to anti-mobilization TikToks—we reveal how digital detectives build high-confidence cases to hold state actors accountable.

    www.scamwatchhq.com/attributing-russian-information-influence-operations-insights-and-frameworks

     

    Sponsors:

    www.myprivacy.blog

    www.breached.company
  • CISO Insights: Voices in Cybersecurity

    Code Dark: The Systemic Crisis of Healthcare Cybersecurity

    15/2/2026 | 32 mins.
    This episode explores how catastrophic ransomware attacks like the Change Healthcare and Ascension incidents have transformed cybercrime from a financial nuisance into a lethal patient safety emergency. We uncover the emerging threats defining 2026, including AI data poisoning, "ghost bug" vulnerabilities in legacy medical devices, and the fragile interdependence of the global diagnostic supply chain. Finally, we break down the federal government’s aggressive new enforcement against information blocking and the "Secure by Design" mandates essential for hospital survival.

    www.breached.company/healthcare-under-siege-47-ransomware-victims-in-30-days-as-patient-safety-crisis-deepens

     

    Sponsors

    www.cisomarketplace.com

    www.breached.company
  • CISO Insights: Voices in Cybersecurity

    State of Security 2026: The Era of Fragmentation and Access

    14/2/2026 | 15 mins.
    Dive into the 2026 State of Security report to understand how geopolitical fragmentation is blurring the lines between statecraft, crime, and war. We explore the shift toward "access-first" strategies by major powers like China and Russia, who are prioritizing the quiet accumulation of access to critical infrastructure and connectivity systems over immediate destruction. Finally, the episode examines the deepening crisis of synthetic identities and how AI is evolving from a hyped threat into a practical tool for fraud and coercion.

    www.breached.company/2026-state-of-security-geopolitical-fragmentation-and-the-redefining-of-global-conflict

     
    Sponsors:
    www.cisomarketplace.com
    www.breached.company

More News podcasts

About CISO Insights: Voices in Cybersecurity

CISO Insights: The Cybersecurity Leadership PodcastWhere Security Leaders Shape Tomorrow’s DefensesJoin us for CISO Insights, the definitive podcast for cybersecurity executives navigating today’s evolving threat landscape. Each episode delivers exclusive conversations with industry pioneers and practical frameworks from security leaders.CISO Insights provides actionable intelligence for executives building resilient security programs. We cover everything from board-level risk communication to threat detection, compliance, and talent development.Whether you’re a CISO, aspiring security leader, or technology executive, we equip you with the tools to thrive in a complex digital environment.Connect with us:Shop: cisomarketplace.comNews: threatwatch.newsPodcast: cisoinsights.showTools: microsec.toolsAI Resources: cybersecuritygpt.storeFollow us:TikTok @cisomarketplace - Quick insights and security tipsYouTube @cisomarketplace - In-depth discussions and CISO interviewsTiktok & Youtube: @ScamwatchHQPowered by grit, fueled by caffeine. Thanks for keeping us going!coff.ee/cisomarketplacecoindrop.to/cisomarketplace
Podcast website

Listen to CISO Insights: Voices in Cybersecurity, Cross Party Lines and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features
Social
v8.6.0 | © 2007-2026 radio.de GmbH
Generated: 2/19/2026 - 11:43:19 PM